اعانه 15 سپتمبر 2024 – 1 اکتبر2024 د پیسو د راټولولو په اړه
1
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

کال:
2012
ژبه:
english
فایل:
PDF, 7.83 MB
5.0 / 4.5
english, 2012
2
Practical Lock Picking - A Physical Penetration Tester's Training Guide

Practical Lock Picking - A Physical Penetration Tester's Training Guide

کال:
2010
ژبه:
english
فایل:
PDF, 19.19 MB
0 / 0
english, 2010
3
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

کال:
2011
ژبه:
english
فایل:
PDF, 3.74 MB
1.0 / 5.0
english, 2011
5
Buffer Overflow Attacks: Detect, Exploit, Prevent

Buffer Overflow Attacks: Detect, Exploit, Prevent

کال:
2005
ژبه:
english
فایل:
PDF, 5.38 MB
5.0 / 5.0
english, 2005
6
Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

Secure Your Network For Free : Using Nmap, Wireshark, Snort, Nessus, and MRGT

کال:
2007
ژبه:
english
فایل:
PDF, 7.20 MB
4.0 / 5.0
english, 2007
8
No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing

No Tech Hacking: A Guide To Social Engineering, Dumpster Diving, and Shoulder Surfing

کال:
2008
ژبه:
english
فایل:
PDF, 21.50 MB
0 / 0
english, 2008
9
Reverse Engineering Code with IDA Pro

Reverse Engineering Code with IDA Pro

کال:
2008
ژبه:
english
فایل:
PDF, 3.91 MB
5.0 / 5.0
english, 2008
10
SQL Injection Attacks and Defense

SQL Injection Attacks and Defense

کال:
2009
ژبه:
english
فایل:
PDF, 3.34 MB
5.0 / 5.0
english, 2009
11
The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

The Wireshark Field Guide: Analyzing and Troubleshooting Network Traffic

کال:
2013
ژبه:
english
فایل:
PDF, 25.24 MB
0 / 0
english, 2013
12
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

Hacking Web Apps: Detecting and Preventing Web Application Security Problems

کال:
2012
ژبه:
english
فایل:
PDF, 14.68 MB
5.0 / 5.0
english, 2012
14
Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat Physical Device Security: Exploiting Hardware and Software

کال:
2005
ژبه:
english
فایل:
PDF, 78.40 MB
0 / 0
english, 2005
15
DNS Security. Defending the Domain Name System

DNS Security. Defending the Domain Name System

کال:
2016
ژبه:
english
فایل:
PDF, 5.80 MB
0 / 0
english, 2016
16
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

کال:
2010
ژبه:
english
فایل:
PDF, 12.87 MB
5.0 / 5.0
english, 2010
17
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

کال:
2007
ژبه:
english
فایل:
PDF, 7.19 MB
0 / 0
english, 2007
18
Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense

Social Engineering Penetration Testing. Executing Social Engineering Pen Tests, Assessments and Defense

کال:
2014
ژبه:
english
فایل:
PDF, 15.11 MB
0 / 0
english, 2014
19
Research Methods for Cyber Security

Research Methods for Cyber Security

کال:
2017
ژبه:
english
فایل:
PDF, 10.28 MB
0 / 0
english, 2017
20
Cryptography for Developers

Cryptography for Developers

کال:
2006
ژبه:
english
فایل:
PDF, 4.10 MB
0 / 0
english, 2006
21
Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware

کال:
2014
ژبه:
english
فایل:
PDF, 5.51 MB
0 / 5.0
english, 2014
22
IP addressing and subnetting, including IPv6

IP addressing and subnetting, including IPv6

کال:
1999
ژبه:
english
فایل:
PDF, 1.73 MB
5.0 / 3.5
english, 1999
23
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

کال:
2014
ژبه:
english
فایل:
PDF, 6.87 MB
5.0 / 5.0
english, 2014
24
Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

کال:
2007
ژبه:
english
فایل:
PDF, 13.67 MB
0 / 0
english, 2007
26
Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

Game Console Hardware Hacking (Xbox, Playstation, Nintendo, Atari And Gamepark 32)

کال:
2004
ژبه:
english
فایل:
PDF, 22.75 MB
0 / 0
english, 2004
27
Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

کال:
2011
ژبه:
english
فایل:
PDF, 39.01 MB
0 / 4.0
english, 2011
28
How to Define and Build an Effective Cyber Threat Intelligence Capability

How to Define and Build an Effective Cyber Threat Intelligence Capability

کال:
2014
ژبه:
english
فایل:
PDF, 3.33 MB
4.0 / 4.0
english, 2014
29
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis

کال:
2012
ژبه:
english
فایل:
PDF, 7.39 MB
0 / 0
english, 2012
31
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

کال:
2010
ژبه:
english
فایل:
PDF, 9.85 MB
0 / 0
english, 2010
32
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

کال:
2012
ژبه:
english
فایل:
PDF, 7.92 MB
0 / 0
english, 2012
33
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

کال:
2011
ژبه:
english
فایل:
PDF, 6.31 MB
4.0 / 4.0
english, 2011
34
Metrics and Methods for Security Risk Management

Metrics and Methods for Security Risk Management

کال:
2010
ژبه:
english
فایل:
PDF, 6.15 MB
0 / 0
english, 2010
35
Essential Skills for Hackers

Essential Skills for Hackers

کال:
2016
ژبه:
english
فایل:
PDF, 6.09 MB
5.0 / 3.0
english, 2016
36
Managed Code Rootkits: Hooking into Runtime Environments

Managed Code Rootkits: Hooking into Runtime Environments

کال:
2010
ژبه:
english
فایل:
PDF, 5.56 MB
5.0 / 5.0
english, 2010
38
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Simple Steps to Data Encryption: A Practical Guide to Secure Computing

کال:
2013
ژبه:
english
فایل:
PDF, 6.57 MB
0 / 5.0
english, 2013
39
Google Hacking for Penetration Testers, Volume 2

Google Hacking for Penetration Testers, Volume 2

کال:
2007
ژبه:
english
فایل:
PDF, 15.27 MB
0 / 0
english, 2007
40
Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

Hiding behind the keyboard : uncovering covert communication methods with forensic analysis

کال:
2016
ژبه:
english
فایل:
PDF, 29.64 MB
0 / 0
english, 2016
41
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration

کال:
2007
ژبه:
english
فایل:
PDF, 5.01 MB
0 / 0
english, 2007
42
Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

کال:
2016
ژبه:
english
فایل:
PDF, 30.45 MB
0 / 5.0
english, 2016
43
Business Continuity and Disaster Recovery Planning for IT Professionals

Business Continuity and Disaster Recovery Planning for IT Professionals

کال:
2007
ژبه:
english
فایل:
PDF, 5.73 MB
0 / 0
english, 2007
44
Perfect Passwords: Selection, Protection, Authentication

Perfect Passwords: Selection, Protection, Authentication

کال:
2005
ژبه:
english
فایل:
PDF, 1.80 MB
0 / 0
english, 2005
45
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence

کال:
2013
ژبه:
english
فایل:
PDF, 165.70 MB
0 / 0
english, 2013
47
Hack Proofing Your Wireless Network

Hack Proofing Your Wireless Network

کال:
2002
ژبه:
english
فایل:
PDF, 5.94 MB
0 / 0
english, 2002
48
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

کال:
2013
ژبه:
english
فایل:
PDF, 9.22 MB
4.0 / 4.5
english, 2013
49
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

کال:
2008
ژبه:
english
فایل:
EPUB, 8.56 MB
0 / 0
english, 2008
50
Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

کال:
2007
ژبه:
english
فایل:
PDF, 10.91 MB
0 / 0
english, 2007